2023 IEEE/CIC International Conference on Communications in China (ICCC)最新文献

筛选
英文 中文
EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios EM-Whisperer:针对虚拟会议场景的电力线语音注入攻击
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233564
Jiachun Li, Yan Meng, Le Zhang, Fazhong Liu, Haojin Zhu
{"title":"EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios","authors":"Jiachun Li, Yan Meng, Le Zhang, Fazhong Liu, Haojin Zhu","doi":"10.1109/ICCC57788.2023.10233564","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233564","url":null,"abstract":"The rapid development of virtual meetings brings much convenience to the user. Due to the limited battery size of smart devices, it is quite common to attend meetings while charging. However, the interface of charging also opens the door to performing audio injection attacks, which may cause series results in the meetings. In this study, based on this insight, we propose a voice injection attack for daily meetings, which is named EM-Whisperer. By modifying simple Commercial-Off-The-Shelf (COTS) devices, the attacker can inject the malicious voice stealthily and remotely with the assistance of the Frequency Modulated (FM) electromagnetic wave. For the designation of EM-Whisperer, we set up two phases: the content based analysis and the voice injection implementation. The content based analysis can be utilized for the selection of the attacking malicious words. After this phase, we can perform the proposed voice injection attacks. Finally, We implement EM-Whisperer for various virtual meeting scenarios in which users utilize various smart devices, including smartphones, laptops, and personal computers. It can achieve more than 90% in attack success rate when facing various impact factors, which proves the superiority of the proposed attacks among existing works.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127936995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Protection for Federated Learning in OFDM Aided Over-the-Air Computation System OFDM辅助空中计算系统中联邦学习的隐私保护
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233294
Yujuan Wang, Rongfei Fan, Han Hu, Ning Zhang
{"title":"Privacy Protection for Federated Learning in OFDM Aided Over-the-Air Computation System","authors":"Yujuan Wang, Rongfei Fan, Han Hu, Ning Zhang","doi":"10.1109/ICCC57788.2023.10233294","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233294","url":null,"abstract":"Federated learning (FL) an emerging distributed and privacy-protecting machine learning paradigm. In FL, training is completed through iterative local training and gradient aggregation among multiple mobile devices (MDs) and the edge server (ES). Over-the-air computation can help to achieve fast aggregation when multiple MDs need to offload their local gradients to the ES. Orthogonal frequency division modulation (OFDM) can further speed up aggregation through enabling simultaneous symbol transmission over multiple fading blocks. In this paper, we focus on the FL system with OFDM aided over-the-air computation technique implemented. To overcome the challenge of non-linear distortion at the amplifier of OFDM transmitter and protect the privacy of each individual MU, we propose a new aggregation method, which normalizes the local gradient first and then add uniformly distributed artificial noise, before it is offloaded to the ES. With our proposed aggregation method, the performance of differential privacy (DP) is analyzed, which disclose the quantization relationship between the variance of artificial noise and the level of privacy protection. We also analyze the peak power at OFDM transmitter by our proposed method, which is shown to be surely less than traditional method. Numerical results verifies the convergence and effectiveness of our proposed strategy.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132411507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-jitter Beamforming Design for UAV-Assisted Maritime Monitoring Networks 无人机辅助海上监测网络的抗抖动波束形成设计
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233419
Yongchun Han, Bin Lin, Lin Liu
{"title":"Anti-jitter Beamforming Design for UAV-Assisted Maritime Monitoring Networks","authors":"Yongchun Han, Bin Lin, Lin Liu","doi":"10.1109/ICCC57788.2023.10233419","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233419","url":null,"abstract":"With the wide application of Internet of Things systems in the smart ocean, many unmanned surface vehicles (USVs) have been deployed jointly with unmanned aerial vehicles (UAVs) to monitor the maritime environment. However, conventional means of maritime communication prevent the UAV and the USV from providing high-rate services owing to complex maritime channel conditions and limited bandwidth, which will affect the maritime environment monitoring performance. In this paper, we propose a USV-UAV collaborative patrol scheme for maritime environment monitoring networks. Considering the characteristic of energy concentration in beamforming and the beam deviation caused by UAV jitter due to the harsh ocean condition, we studied an adaptive anti-jitter beamforming problem in UAV-assisted maritime environment monitoring networks. Specifically, we decompose the adaptive anti-jitter beamforming problem into two subproblems. In the first sub-problem, the location deployment of UAV and beam gain allocation is optimized via an iterative search algorithm based on ideal beamforming. In the second sub-problem, anti-jitter beamforming design is solved by an adaptive particle swarm optimization algorithm based on social learning, which effectively improves the average spectral efficiency of the system. Finally, the simulation results show that the proposed algorithm has good adaptability under different jitter amplitudes and effectively improves the spectral efficiency without increasing the complexity.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134031958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alarm Association Mining Model Based on Merging Strategy 基于合并策略的告警关联挖掘模型
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233554
Hong Zhu, Cheng Deng, Yu Wang, Yixin Zhao
{"title":"Alarm Association Mining Model Based on Merging Strategy","authors":"Hong Zhu, Cheng Deng, Yu Wang, Yixin Zhao","doi":"10.1109/ICCC57788.2023.10233554","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233554","url":null,"abstract":"In the process of alarm association mining, the average length of alarm ID is more than 60 characters, and the basic operation will occupy a lot of resources, which makes the mining task difficult to complete in the effective time. In this paper, the mining process is optimized for the follow problems. Firstly, the alarm data set is divided into subsets in the computer room. Secondly, the statistics of alarm-related matters in each subset are realized by merging. Finally, standardize the alarm ID according to the statistical characteristics of the alarm data set. Furthermore, the operation speed of the model of alarm association mining is greatly improved.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134261187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Doppler Spread Analysis for Reducing High-Mobility Massive MIMO V2V Channel Time-Variation 减少高迁移率大规模MIMO V2V信道时变的多普勒频散分析
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233357
Zeyu Yan, Weile Zhang
{"title":"Doppler Spread Analysis for Reducing High-Mobility Massive MIMO V2V Channel Time-Variation","authors":"Zeyu Yan, Weile Zhang","doi":"10.1109/ICCC57788.2023.10233357","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233357","url":null,"abstract":"In this paper, we consider fast time-varying channels of high-mobility vehicle-to-vehicle (V2V) communications for massive multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) systems. Large-scale uniform linear arrays (ULA) are configured at the transmitter and receiver to separate multiple angle domain Doppler frequency offsets (DFOs) based on transmit and receive beamforming with high spatial resolution. Then each beamforming branch comprises only one dominant DFO. Next, we perform the conventional channel estimation method for each beamforming branch, and carry out maximum-ratio-combining (MRC) for data detection. Power spectrum density (PSD) and Doppler spread of the equivalent link between the transmitter and receiver are derived and regarded as the criterion for assessing the residual channel time-variation caused by limited antennas in practice. Interestingly, the asymptotic scaling law between Doppler spread and the number of transceiver antennas shows that Doppler spread is proportional to the maximum DFO and decreases at the rate of $sqrt {frac{1}{{N_T^2}} + frac{1}{{N_R^2}}} $, where NT and NR are the number of transmit and receive antennas, respectively. Simulation results confirm the validity of the proposed Doppler suppression framework for high-mobility V2V communications.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134543383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link Selection Based on Acquisition Probability in Mega Constellation Laser Networks 基于捕获概率的巨星座激光网络链路选择
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233362
Junyi Yang, Zhikai Zhang, Bowen Feng, Lirong An, Qinyu Zhang
{"title":"Link Selection Based on Acquisition Probability in Mega Constellation Laser Networks","authors":"Junyi Yang, Zhikai Zhang, Bowen Feng, Lirong An, Qinyu Zhang","doi":"10.1109/ICCC57788.2023.10233362","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233362","url":null,"abstract":"Satellite networks consisting of multiple orbits and tremendous satellites are the essential component of future wireless communication. Laser inter-satellite links (LISLs) that can provide high capacity and highly reliable communication links bring the implementation of mega constellation networks (MCNs) into reality. Due to the high speed and vibration of the satellite, the success rate of LISL establishment is difficult to be fitted by traditional statistical methods. Aiming at the problem of LISL establishment probability, we build the LISL establishment evaluation model based on the acquisition probability of laser terminal system. Through theoretically analyzing the impacts of various factors on the LISLs, a link selection algorithm based on maximum received power optimization problem is proposed. And the proposed algorithm can adapt to the different laser terminal access distance. The simulation results show that the proposed algorithm can effectively reduce the average hop-count and average network latency from a global network perspective.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-Based Log Anomaly Detection for 5G Core Network 基于深度学习的5G核心网日志异常检测
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233555
Yawen Tan, Jiadai Wang, Jiajia Liu, Yuanhao Li
{"title":"Deep Learning-Based Log Anomaly Detection for 5G Core Network","authors":"Yawen Tan, Jiadai Wang, Jiajia Liu, Yuanhao Li","doi":"10.1109/ICCC57788.2023.10233555","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233555","url":null,"abstract":"Adopting network function virtualization in 5G core network (CN) enables flexible and agile service development, but it also brings increased complexity and the likelihood of anomalies, emphasizing the vital importance of effective anomaly detection. While existing research primarily focuses on detecting external anomalies for 5G networks through network traffic analysis, there is a growing need to identify internal abnormalities and failures within the 5G CN. Towards this end, considering the wide recognition of log data as a valuable information source for troubleshooting and fault diagnosis, we develop a deep learning (DL)-based log anomaly detection framework for 5G CN. The framework encompasses log parsing, log grouping, feature extraction, and model training, and each module is designed with distinct functionalities to enable combinational usage in various situations. We also establish a cloud-native 5G testbed to facilitate the collection of a large-volume 5G CN log dataset, wherein multiple types of anomalies are injected. Evaluation results illustrate that our highest achieved F1 score exceeds 97%, highlighting the effectiveness of our proposed anomaly detection framework for 5G CN.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133313217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning-Based Latency and Energy Optimization in SCMA-Enhanced UAV-MEC Networks 基于学习的scma增强无人机- mec网络时延和能量优化
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233490
Pengtao Liu, Jing Lei, W. Liu
{"title":"Learning-Based Latency and Energy Optimization in SCMA-Enhanced UAV-MEC Networks","authors":"Pengtao Liu, Jing Lei, W. Liu","doi":"10.1109/ICCC57788.2023.10233490","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233490","url":null,"abstract":"Sparse code multiple access (SCMA) technology can provide massive connectivity and timely computing in unmanned aerial vehicle (UAV) assisted mobile edge computing (MEC) networks. In this paper, the long-term task latency and energy consumption minimization problem in SCMA-enhanced UAV-MEC networks is investigated. We first formulate it as a Markov decision process (MDP) under a dynamic environment and then propose a joint computation offloading, SCMA resource allocation, and UAV trajectory algorithm based on convolutional neural network (CNN) and deep deterministic policy gradient (DDPG). Specifically, the UAV is taken as an agent to extract channel and task features of multiple devices through CNN for action exploration. The weighted sum of task latency and energy consumption is used as a reward with a penalty for failing to complete the task within the deadline or when the UAV battery runs out. Eventually, the near-optimal strategy is obtained through experience training and interaction with the environment. Simulation results illustrate that the proposed algorithm can achieve convergence and has greater advantages over other benchmark algorithms.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131666208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Full-Duplex Relay for Ultraviolet Communications Using Photomultiplier Tube Receivers 利用光电倍增管接收机实现紫外通信的全双工中继
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233523
Zhifeng Wang, Renzhi Yuan, Mugen Peng, Siming Wang, Xinyi Chu, Shijie Di
{"title":"Full-Duplex Relay for Ultraviolet Communications Using Photomultiplier Tube Receivers","authors":"Zhifeng Wang, Renzhi Yuan, Mugen Peng, Siming Wang, Xinyi Chu, Shijie Di","doi":"10.1109/ICCC57788.2023.10233523","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233523","url":null,"abstract":"Ultraviolet (UV) communication is a promising technology for future vehicle communication systems due to its inherent advantages including the non-line-of-sight ability, low background noise, and high local security. Full-duplex relay-assisted UV communications can achieve longer communication distances and higher efficiency of time-frequency utilization compared with direct UV communications. However, the full-duplex relay suffers from serious self-interferences due to the strong scattering or reflection of UV signals. To explore the influence of the self-interference, we first derive the bit-error rate (BER) for the full-duplex relay-assisted UV communication using photomultiplier tube receivers. Then we use the Gaussian approximation to derive an analytical threshold, which can be used as the initial point for searching the optimal threshold for minimizing the BER. Besides, we investigate the optimal relay placement for the full-duplex relay-assisted UV communication for minimizing the BER. The numerical results show that the derived analytical threshold is close to the optimal threshold. Besides, we find that the optimal relay placement under small self-interference is equidistant between the source node and the destination node; and the optimal relay placement will gradually approach the source node as the self-interference increases.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127324061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contact-aware Multiple-Layer CHORD for routing in Large-scale Satellite Networks 面向大规模卫星网络路由的接触感知多层CHORD
2023 IEEE/CIC International Conference on Communications in China (ICCC) Pub Date : 2023-08-10 DOI: 10.1109/ICCC57788.2023.10233407
Han Li, Yue Li, Qinyu Zhang, Zhihua Yang
{"title":"Contact-aware Multiple-Layer CHORD for routing in Large-scale Satellite Networks","authors":"Han Li, Yue Li, Qinyu Zhang, Zhihua Yang","doi":"10.1109/ICCC57788.2023.10233407","DOIUrl":"https://doi.org/10.1109/ICCC57788.2023.10233407","url":null,"abstract":"Large-scale satellite network attracts wide attentions of research community within the coming developments of next-generation networks. Considering the large expansion of the number of nodes in satellite networks, storing and updating global routing tables is almost impossible. Besides, the link state among nodes is more complex with a dynamic topology. To address above issues, we study the distributed routing problem in a large-scale satellite network. In this paper, we propose a routing mechanism in large-scale satellite networks based on Chord, which consists of a well-designed multiple-layer Chord architecture with a set of identification mapping schemes, a contact-based multi-layer finger table, an efficient path lookup algorithm and a routing table update algorithm, respectively. Via simulation results, it could be verified that under different satellite network scales, the proposed routing mechanism in this paper can achieve better end-to-end latency and update overhead.","PeriodicalId":191968,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133836775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信